1// Copyright 2023 Google LLC 2// 3// Licensed under the Apache License, Version 2.0 (the "License"); 4// you may not use this file except in compliance with the License. 5// You may obtain a copy of the License at 6// 7// http://www.apache.org/licenses/LICENSE-2.0 8// 9// Unless required by applicable law or agreed to in writing, software 10// distributed under the License is distributed on an "AS IS" BASIS, 11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12// See the License for the specific language governing permissions and 13// limitations under the License. 14 15syntax = "proto3"; 16 17package google.cloud.securitycenter.v1; 18 19option csharp_namespace = "Google.Cloud.SecurityCenter.V1"; 20option go_package = "cloud.google.com/go/securitycenter/apiv1/securitycenterpb;securitycenterpb"; 21option java_multiple_files = true; 22option java_outer_classname = "MitreAttackProto"; 23option java_package = "com.google.cloud.securitycenter.v1"; 24option php_namespace = "Google\\Cloud\\SecurityCenter\\V1"; 25option ruby_package = "Google::Cloud::SecurityCenter::V1"; 26 27// MITRE ATT&CK tactics and techniques related to this finding. 28// See: https://attack.mitre.org 29message MitreAttack { 30 // MITRE ATT&CK tactics that can be referenced by SCC findings. 31 // See: https://attack.mitre.org/tactics/enterprise/ 32 enum Tactic { 33 // Unspecified value. 34 TACTIC_UNSPECIFIED = 0; 35 36 // TA0043 37 RECONNAISSANCE = 1; 38 39 // TA0042 40 RESOURCE_DEVELOPMENT = 2; 41 42 // TA0001 43 INITIAL_ACCESS = 5; 44 45 // TA0002 46 EXECUTION = 3; 47 48 // TA0003 49 PERSISTENCE = 6; 50 51 // TA0004 52 PRIVILEGE_ESCALATION = 8; 53 54 // TA0005 55 DEFENSE_EVASION = 7; 56 57 // TA0006 58 CREDENTIAL_ACCESS = 9; 59 60 // TA0007 61 DISCOVERY = 10; 62 63 // TA0008 64 LATERAL_MOVEMENT = 11; 65 66 // TA0009 67 COLLECTION = 12; 68 69 // TA0011 70 COMMAND_AND_CONTROL = 4; 71 72 // TA0010 73 EXFILTRATION = 13; 74 75 // TA0040 76 IMPACT = 14; 77 } 78 79 // MITRE ATT&CK techniques that can be referenced by SCC findings. 80 // See: https://attack.mitre.org/techniques/enterprise/ 81 // Next ID: 59 82 enum Technique { 83 // Unspecified value. 84 TECHNIQUE_UNSPECIFIED = 0; 85 86 // T1036 87 MASQUERADING = 49; 88 89 // T1036.005 90 MATCH_LEGITIMATE_NAME_OR_LOCATION = 50; 91 92 // T1037 93 BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37; 94 95 // T1037.005 96 STARTUP_ITEMS = 38; 97 98 // T1046 99 NETWORK_SERVICE_DISCOVERY = 32; 100 101 // T1057 102 PROCESS_DISCOVERY = 56; 103 104 // T1059 105 COMMAND_AND_SCRIPTING_INTERPRETER = 6; 106 107 // T1059.004 108 UNIX_SHELL = 7; 109 110 // T1069 111 PERMISSION_GROUPS_DISCOVERY = 18; 112 113 // T1069.003 114 CLOUD_GROUPS = 19; 115 116 // T1071 117 APPLICATION_LAYER_PROTOCOL = 45; 118 119 // T1071.004 120 DNS = 46; 121 122 // T1072 123 SOFTWARE_DEPLOYMENT_TOOLS = 47; 124 125 // T1078 126 VALID_ACCOUNTS = 14; 127 128 // T1078.001 129 DEFAULT_ACCOUNTS = 35; 130 131 // T1078.003 132 LOCAL_ACCOUNTS = 15; 133 134 // T1078.004 135 CLOUD_ACCOUNTS = 16; 136 137 // T1090 138 PROXY = 9; 139 140 // T1090.002 141 EXTERNAL_PROXY = 10; 142 143 // T1090.003 144 MULTI_HOP_PROXY = 11; 145 146 // T1098 147 ACCOUNT_MANIPULATION = 22; 148 149 // T1098.001 150 ADDITIONAL_CLOUD_CREDENTIALS = 40; 151 152 // T1098.004 153 SSH_AUTHORIZED_KEYS = 23; 154 155 // T1098.006 156 ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58; 157 158 // T1105 159 INGRESS_TOOL_TRANSFER = 3; 160 161 // T1106 162 NATIVE_API = 4; 163 164 // T1110 165 BRUTE_FORCE = 44; 166 167 // T1129 168 SHARED_MODULES = 5; 169 170 // T1134 171 ACCESS_TOKEN_MANIPULATION = 33; 172 173 // T1134.001 174 TOKEN_IMPERSONATION_OR_THEFT = 39; 175 176 // T1190 177 EXPLOIT_PUBLIC_FACING_APPLICATION = 27; 178 179 // T1484 180 DOMAIN_POLICY_MODIFICATION = 30; 181 182 // T1485 183 DATA_DESTRUCTION = 29; 184 185 // T1489 186 SERVICE_STOP = 52; 187 188 // T1490 189 INHIBIT_SYSTEM_RECOVERY = 36; 190 191 // T1496 192 RESOURCE_HIJACKING = 8; 193 194 // T1498 195 NETWORK_DENIAL_OF_SERVICE = 17; 196 197 // T1526 198 CLOUD_SERVICE_DISCOVERY = 48; 199 200 // T1528 201 STEAL_APPLICATION_ACCESS_TOKEN = 42; 202 203 // T1531 204 ACCOUNT_ACCESS_REMOVAL = 51; 205 206 // T1539 207 STEAL_WEB_SESSION_COOKIE = 25; 208 209 // T1543 210 CREATE_OR_MODIFY_SYSTEM_PROCESS = 24; 211 212 // T1548 213 ABUSE_ELEVATION_CONTROL_MECHANISM = 34; 214 215 // T1552 216 UNSECURED_CREDENTIALS = 13; 217 218 // T1556 219 MODIFY_AUTHENTICATION_PROCESS = 28; 220 221 // T1562 222 IMPAIR_DEFENSES = 31; 223 224 // T1562.001 225 DISABLE_OR_MODIFY_TOOLS = 55; 226 227 // T1567 228 EXFILTRATION_OVER_WEB_SERVICE = 20; 229 230 // T1567.002 231 EXFILTRATION_TO_CLOUD_STORAGE = 21; 232 233 // T1568 234 DYNAMIC_RESOLUTION = 12; 235 236 // T1570 237 LATERAL_TOOL_TRANSFER = 41; 238 239 // T1578 240 MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26; 241 242 // T1578.001 243 CREATE_SNAPSHOT = 54; 244 245 // T1580 246 CLOUD_INFRASTRUCTURE_DISCOVERY = 53; 247 248 // T1588 249 OBTAIN_CAPABILITIES = 43; 250 251 // T1595 252 ACTIVE_SCANNING = 1; 253 254 // T1595.001 255 SCANNING_IP_BLOCKS = 2; 256 257 // T1613 258 CONTAINER_AND_RESOURCE_DISCOVERY = 57; 259 } 260 261 // The MITRE ATT&CK tactic most closely represented by this finding, if any. 262 Tactic primary_tactic = 1; 263 264 // The MITRE ATT&CK technique most closely represented by this finding, if 265 // any. primary_techniques is a repeated field because there are multiple 266 // levels of MITRE ATT&CK techniques. If the technique most closely 267 // represented by this finding is a sub-technique (e.g. `SCANNING_IP_BLOCKS`), 268 // both the sub-technique and its parent technique(s) will be listed (e.g. 269 // `SCANNING_IP_BLOCKS`, `ACTIVE_SCANNING`). 270 repeated Technique primary_techniques = 2; 271 272 // Additional MITRE ATT&CK tactics related to this finding, if any. 273 repeated Tactic additional_tactics = 3; 274 275 // Additional MITRE ATT&CK techniques related to this finding, if any, along 276 // with any of their respective parent techniques. 277 repeated Technique additional_techniques = 4; 278 279 // The MITRE ATT&CK version referenced by the above fields. E.g. "8". 280 string version = 5; 281} 282